Skip to main content

Cisco Releases Security Advisories Affecting Smart Licensing Utility and Identity Service Engine

Advisories address two critical vulnerabilities in Smart Licensing Utility and one medium vulnerability in Identity Service Engine

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Advisories address two critical vulnerabilities in Smart Licensing Utility and one medium vulnerability in Identity Service Engine


Threat details

Exploitation attempts of CVE-2024-20440 and CVE-2024-20439

Exploitation attempts of CVE-2024-20440 and CVE-2024-20439 vulnerabilities have been observed in the wild. Additionally, a proof-of-concept exploit code for CVE-2024-20469 is publicly available. The NHS England National CSOC assesses exploitation of these vulnerabilities is considered more likely.


Introduction

Cisco has released a security advisory relating to two critical severity vulnerabilities in Smart Licensing Utility. Cisco Smart License Utility (CSLU) is an application that enables customers to administer licenses and their associated Product Instances from their premises instead of having to directly connect their Smart Licensed enabled Product Instances to Cisco Smart Software Manager (CSSM).

  • CVE-2024-20439 has a CVSSv3 score of 9.8 and could allow an unauthenticated, remote attacker to log in to an affected system by using a static administrative credential. 
  • CVE-2024-20440 has a CVSSv3 score of 9.8 and could allow an unauthenticated, remote attacker to access sensitive information.  

Cisco has also released an advisory regarding a command injection vulnerability affecting Identity Services Engine. Identity Services Engine is a security policy management platform that provides secure network access to end users and devices.

  • CVE-2024-20469 has a CVSSv3 score of 6.0 and could allow an authenticated, local attacker to perform command injection attacks on the underlying operating systems and escalate privileges to root. To exploit this vulnerability, the attacker must have valid administrator privileges.

Threat updates

Date Update
21 Mar 2025 Exploitation attempts of CVE-2024-20440 and CVE-2024-20439 have been observed in the wild.

Remediation advice

Affected organisations are encouraged to review the Cisco Security Advisories page and apply the relevant updates detailed in the advisories below. 


Remediation steps

Type Step
Patch

Cisco Smart Licensing Utility Vulnerabilities | cisco-sa-cslu-7gHMzWmw


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw
Patch

Cisco Identity Services Engine Command Injection Vulnerability | cisco-sa-ise-injection-6kn9tSxm


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-6kn9tSxm


CVE Vulnerabilities

Last edited: 21 March 2025 1:01 pm